SlideShare una empresa de Scribd logo
1 de 25
Social Networks
Social Networking is a social structure made
of individuals who are tied by specific types of
relationships.
• Facebook
• Twitter
• Flickr
• YouTube
• Snapchat
• Instagram
• Pinterest
• Craigslist
Revised from Technological Awareness for Teens and Young Adults,
UNM presentation http://ow.ly/PWvU6
Awareness is
the key
Everyone is a target
Organized crime
funds the
attacks
Text
Messaging
 Sexting is sending nude pictures via text
message
 50% of teenagers admit to engaging in sexting
http://www.cnn.com/2014/11/18/living/teens-sexting-what-parents-can-do/
 Messages can be forwarded to unintended recipients
 Could be embarrassing if pictures were seen by unintended
parties
 Sexting can be considered child pornography
http://www.nbcwashington.com/news/local/Va-Teen-Could-be-Jailed-for-Sexting-Girlfriend-
265770831.html
Technological Awareness for Teens and Young Adults, UNM presentation
http://ow.ly/PWvU6
You will not be able to shelter your students
from the Internet and social networking
Focus instead on preparing
them for the dangers they will
face
They can (and will)
defeat every technical
control you put in place
What you already know
Use strong
passwords, aka
passphrases
Length > complexity
TIP
It was a dark and
stormy night
becomes
ItwasaDark215andStormyNight
Keep Your Software (and Hardware
up to date!
TIP
TIP
Use
protection
Recognize
phishing &
scams
TIP
Use social
networks
safely
TIP
Remember
who else
is there
• Employers
• Admissions Offices
• Identity thieves
• Online predators
• 1 in 7 10-17 year olds are approached by an online predator
(http://www.rsaconference.com/media/cyber-safety-kids-the-true-story-of-alicia)
TIP
Don’t post
inappropriate
photos!
TIP
Be
wary
of
others
Is this really your friend..?
TIP
TIP
Monitor
Your
Child’s
Name
Onlinehttps://www.google.com/settings/dashboard
Guard
personal
information
TIP
Never
assume
privacy
TIP
Who’s
following
you?
TIP
Questions (and maybe some
answers)
Ben Woelk
Ben.woelk@gmail.com
Benwoelk.com
@benwoelk
www.linkedin.com/in/benwoelk/
http://www.slideshare.net/bwoelk
Resource List
• National Cyber Security Alliance (for parents section)
https://www.staysafeonline.org/stay-safe-online/
• OnGuardOnline.gov
https://www.onguardonline.gov/topics/protect-kids-online
• Darkness to Light: End Child Sexual Abuse Internet Safety
http://ow.ly/PVavb
• Bivonia Child Advocacy Center
https://www.facebook.com/BivonaCAC
• Shockproofing Your Use of Social Media eBook, Woelk
http://amzn.com/B00OJMK4T2
• Parenting in the Cyber Age: A Parents’ Guide to Safer Social Networking
http://benwoelk.com/parenting-in-the-cyber-age/
• National Center for Missing and Exploited Children
http://missingkids.org/Home
• Cyber Bullying: Protecting Kids and Adults from Online Bullies
McQuade III, Colt, Meyer
https://books.google.com/books/about/Cyber_Bullying.html
• Technological Awareness for Teens and Young Adults, UNM presentation
http://bit.ly/1fDAe0l

Más contenido relacionado

La actualidad más candente

Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211
Saedah
 

La actualidad más candente (19)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
 
Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211
 

Similar a Cyber Safety for Middle School Students and Parents

Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
mitchell_shannon
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
WISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: Cyberbullying
WISE KIDS
 

Similar a Cyber Safety for Middle School Students and Parents (20)

Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
WISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: Cyberbullying
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE Programme
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
Portia final
Portia finalPortia final
Portia final
 
Parenting the Net Generation - Preview Version
Parenting the Net Generation - Preview VersionParenting the Net Generation - Preview Version
Parenting the Net Generation - Preview Version
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
6 23-15 Social Media Etiquette for Professionals
6 23-15 Social Media Etiquette for Professionals6 23-15 Social Media Etiquette for Professionals
6 23-15 Social Media Etiquette for Professionals
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Web safety
Web safetyWeb safety
Web safety
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
Social Media for Youth Leaders, May 2014, for @c_of_e
Social Media for Youth Leaders, May 2014, for @c_of_eSocial Media for Youth Leaders, May 2014, for @c_of_e
Social Media for Youth Leaders, May 2014, for @c_of_e
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 
Film240
Film240Film240
Film240
 

Más de Ben Woelk, CISSP, CPTC

Más de Ben Woelk, CISSP, CPTC (20)

Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceCreating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
 
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
 
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
 
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
 
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessWe're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
 
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
 
Building a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
 
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
 
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
 
Digital self defense 101 me rit
Digital self defense 101 me ritDigital self defense 101 me rit
Digital self defense 101 me rit
 
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
 
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and YourselfCollaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself
 
An Introvert's Journey to Leadership
An Introvert's Journey to LeadershipAn Introvert's Journey to Leadership
An Introvert's Journey to Leadership
 
Digital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminarDigital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminar
 
Digital Self Defense at RIT
Digital Self Defense at RITDigital Self Defense at RIT
Digital Self Defense at RIT
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
 
Succession Planning and Volunteering
Succession Planning and VolunteeringSuccession Planning and Volunteering
Succession Planning and Volunteering
 
Digital Self Defense
Digital Self DefenseDigital Self Defense
Digital Self Defense
 
Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014
 
A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 

Cyber Safety for Middle School Students and Parents

  • 1.
  • 2.
  • 3.
  • 4. Social Networks Social Networking is a social structure made of individuals who are tied by specific types of relationships. • Facebook • Twitter • Flickr • YouTube • Snapchat • Instagram • Pinterest • Craigslist Revised from Technological Awareness for Teens and Young Adults, UNM presentation http://ow.ly/PWvU6
  • 5. Awareness is the key Everyone is a target Organized crime funds the attacks
  • 6.
  • 7.
  • 8. Text Messaging  Sexting is sending nude pictures via text message  50% of teenagers admit to engaging in sexting http://www.cnn.com/2014/11/18/living/teens-sexting-what-parents-can-do/  Messages can be forwarded to unintended recipients  Could be embarrassing if pictures were seen by unintended parties  Sexting can be considered child pornography http://www.nbcwashington.com/news/local/Va-Teen-Could-be-Jailed-for-Sexting-Girlfriend- 265770831.html Technological Awareness for Teens and Young Adults, UNM presentation http://ow.ly/PWvU6
  • 9.
  • 10. You will not be able to shelter your students from the Internet and social networking Focus instead on preparing them for the dangers they will face They can (and will) defeat every technical control you put in place What you already know
  • 11. Use strong passwords, aka passphrases Length > complexity TIP It was a dark and stormy night becomes ItwasaDark215andStormyNight
  • 12. Keep Your Software (and Hardware up to date! TIP
  • 16. Remember who else is there • Employers • Admissions Offices • Identity thieves • Online predators • 1 in 7 10-17 year olds are approached by an online predator (http://www.rsaconference.com/media/cyber-safety-kids-the-true-story-of-alicia) TIP
  • 18. Be wary of others Is this really your friend..? TIP
  • 23.
  • 24. Questions (and maybe some answers) Ben Woelk Ben.woelk@gmail.com Benwoelk.com @benwoelk www.linkedin.com/in/benwoelk/ http://www.slideshare.net/bwoelk
  • 25. Resource List • National Cyber Security Alliance (for parents section) https://www.staysafeonline.org/stay-safe-online/ • OnGuardOnline.gov https://www.onguardonline.gov/topics/protect-kids-online • Darkness to Light: End Child Sexual Abuse Internet Safety http://ow.ly/PVavb • Bivonia Child Advocacy Center https://www.facebook.com/BivonaCAC • Shockproofing Your Use of Social Media eBook, Woelk http://amzn.com/B00OJMK4T2 • Parenting in the Cyber Age: A Parents’ Guide to Safer Social Networking http://benwoelk.com/parenting-in-the-cyber-age/ • National Center for Missing and Exploited Children http://missingkids.org/Home • Cyber Bullying: Protecting Kids and Adults from Online Bullies McQuade III, Colt, Meyer https://books.google.com/books/about/Cyber_Bullying.html • Technological Awareness for Teens and Young Adults, UNM presentation http://bit.ly/1fDAe0l

Notas del editor

  1. Hi, I’m Ben Woelk. I’m the Policy and Awareness Analyst in the RIT information Security Office. Part of my role is to build a culture of security awareness. Today we’re going to learn about Shockproofing Your Use of Social Media. In other words, how to stay safe online.
  2. Does anybody see anything wrong with this picture? Here’s the problem, Everyone is a Target. Identity theft is big business. It’s not done by hackers sitting in their basements. Well maybe some of the people committing identity theft are hackers in their basements, but they’re funded by organized crime.
  3. Here’s the big problem: You can’t rely on others to protect you. You need to learn to protect yourself. That’s what this presentation is all about—giving you ten tips to stay safe online.
  4. Tip #1: Use a Passphrase. We’ve all heard about passwords. I want you to start using passphrases. Passphrases are long, but easier to remember than a password. Length is more important than complexity. Throw in some numbers and capital letters and the phrase on the screen becomes ItwasaDark215andStormyNight. Easy to remember.
  5. Tip # 2: Stay up to date. Attackers exploit vulnerabilities in software. Software vendors release patches to address these vulnerabilities. We all know that we need to keep our operating systems up to date. You also need to keep your applications up to date. Make sure you’ve turned on auto update.
  6. Tip #3: Use Protection. No, there’s no such thing as an iCondom. However, one of the best ways to protect your computer is to use layers of security. Use anti-virus, a firewall, and anti-spyware. Mac users need antivirus and need to make sure your firewall is enabled. And don’t forget about your mobile devices. They’re starting to become more and more of a target.
  7. Tip #4: Recognize Phishing and scams. Many of you met Phishy at move in. Phishy is here to help raise our awareness about phishing. It’s pretty basic. Never respond to email requests for your password. (Or over the phone)
  8. Tip #5: Use Social Networks Safely. Don’t post information about where you live or where you’re going to be on Facebook or Twitter. Yes, it’s rare, but if you have an open profile on Facebook or you’re using FourSquare and tweeting your whereabouts publicly, you’re putting yourself at risk.
  9. Tip #6: Remember who else is there. Employers will try to find out as much about you as they can online. They may try to access your social media profiles. There was a court case this month, where the court decided that what you post online is not protected. Think before you post about the image you’re portraying.
  10. Don’t post inappropriate photos. Untag inappropriate photos of you your friends post. Would you hire this guy? People WILL judge you by what you post online. Think before you post! Clean up your profiles now.
  11. Tip #7: Be wary of others. How do you know the person claiming to be 19 years old isn’t a 40 something who’s masquerading as someone else? How do you know he or she isn’t a wolf in sheep’s clothing? Be careful.
  12. Tip #8: Search for your name. Set up a Google Alert in Google Dashboard to let you know every day how your name is appearing online. You can set up a search for anything. So if there’s something you want to track online, set up the alert.
  13. Tip #9: Guard your personal information. Wouldn’t you like to have a guard dog like this protecting your information? Hmm. Maybe not. Protecting your personal information hasn’t been a big deal for you so far. It will be as you develop a credit history.
  14. Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do?
  15. Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do?